Utilize este identificador para referenciar este registo:
http://hdl.handle.net/10071/35360
Registo completo
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Polónio, J. | - |
dc.contributor.author | Moura, J. | - |
dc.contributor.author | Marinheiro, R. N. | - |
dc.date.accessioned | 2025-10-17T15:03:57Z | - |
dc.date.available | 2025-10-17T15:03:57Z | - |
dc.date.issued | 2025 | - |
dc.identifier.citation | Polónio, J., Moura, J., & Marinheiro, R. N. (2025). Towards automatic detection and mitigation of high-risk cybersecurity vulnerabilities at networked systems. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3622497 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://hdl.handle.net/10071/35360 | - |
dc.description.abstract | The current manuscript investigates a comprehensive security framework designed to proactively detect, classify, prioritize, and mitigate high-risk cybersecurity vulnerabilities in networked systems controlled by software-defined networking (SDN). While available literature explores various approaches, it lacks solutions that aggregate in a logically centralized and automated ways the previous referred capabilities. Orchestrating efficiently all these capabilities is crucial to continuously ensure the reliable operation of high-complexity networked systems. This article integrates in a novel way SDN with the Security Orchestration, Automation, and Response (SOAR) paradigm to automatically identify and address security vulnerabilities in network devices before they can be exploited. The proposed open-source framework leverages standardized risk indicators to rank discovered vulnerabilities and apply the most suitable mitigation strategies to mitigate the vulnerabilities with the highest risk of being explored against the system normal operation. The paper framework enhances the reactive security capabilities offered by legacy network devices such as Firewalls and Intrusion Detection Systems (IDSs). The paper details the design, implementation, and evaluation of the framework, validated through both emulation and hardware-based tests. The results confirm that the solution is effective in identifying and mitigating vulnerabilities across diverse devices. Analyzing the results obtained from scalability tests, as the number of scanned devices exceeds a certain threshold, CPU usage increases significantly, while memory and communication resources remain underutilized. In addition, after identifying high-risk device vulnerabilities, the framework automatically applies mitigation measures, timely protecting the system normal operation. Future work may improve the capabilities of the framework by using artificial intelligence for more efficient device vulnerability discovery, context-aware security risk evaluation, and better-aligned mitigation actions targeting identified high-risk security vulnerabilities. | eng |
dc.language.iso | eng | - |
dc.publisher | IEEE | - |
dc.relation | info:eu-repo/grantAgreement/FCT/Inteligência Artificial, Ciência dos Dados e Cibersegurança de relevância na Administração Pública/2024.07624.IACDC/PT | - |
dc.relation | UID/50008 | - |
dc.rights | openAccess | - |
dc.subject | System vulnerability | eng |
dc.subject | Detection | eng |
dc.subject | Risk | eng |
dc.subject | Mitigation | eng |
dc.subject | Software defined networks | eng |
dc.subject | Automation | eng |
dc.subject | Network security | eng |
dc.title | Towards automatic detection and mitigation of high-risk cybersecurity vulnerabilities at networked systems | eng |
dc.type | article | - |
dc.peerreviewed | yes | - |
dc.volume | N/A | - |
dc.date.updated | 2025-10-17T16:03:00Z | - |
dc.description.version | info:eu-repo/semantics/acceptedVersion | - |
dc.identifier.doi | 10.1109/ACCESS.2025.3622497 | - |
dc.subject.fos | Domínio/Área Científica::Ciências Naturais::Ciências da Computação e da Informação | por |
dc.subject.fos | Domínio/Área Científica::Engenharia e Tecnologia::Engenharia Eletrotécnica, Eletrónica e Informática | por |
iscte.identifier.ciencia | https://ciencia.iscte-iul.pt/id/ci-pub-113233 | - |
iscte.journal | IEEE Access | - |
Aparece nas coleções: | IT-RI - Artigos em revistas científicas internacionais com arbitragem científica |
Ficheiros deste registo:
Ficheiro | Tamanho | Formato | |
---|---|---|---|
article_113233.pdf | 1,03 MB | Adobe PDF | Ver/Abrir |
Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.